CVE-2026-39881

NameCVE-2026-39881
DescriptionVim is an open source, command line text editor. Prior to 9.2.0316, a command injection vulnerability in Vim's netbeans interface allows a malicious netbeans server to execute arbitrary Ex commands when Vim connects to it, via unsanitized strings in the defineAnnoType and specialKeys protocol messages. This vulnerability is fixed in 9.2.0316.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
vim (PTS)bullseye2:8.2.2434-3+deb11u1vulnerable
bullseye (security)2:8.2.2434-3+deb11u3vulnerable
bookworm2:9.0.1378-2+deb12u2vulnerable
trixie2:9.1.1230-2vulnerable
forky, sid2:9.2.0355-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
vimsource(unstable)2:9.2.0338-1

Notes

https://github.com/vim/vim/security/advisories/GHSA-mr87-rhgv-7pw6
Fixed by: https://github.com/vim/vim/commit/7ab76a86048ed492374ac6b19c6cb52f89a365b4 (v9.2.0316)

Search for package or bug name: Reporting problems